Wave 5 – The Socialisation of Brands je deo globalnog istraživanja koje se sprovodi sa ciljem da se definišu ogromne promene nastale u načinima komunikacije, kao rezultat rastućeg uticaja društvenih medija. Istraživanje se sprovodi jednom godišnje, od 2006. godine a ove godine po prvi put i u Srbiji.
What To Know About Starting in Social Media Tara Coomans
This presentation is newly updated for May 2013 with the latest statistics and insight needed to begin a career in social media marketing, includes examples and case studies as well as information about social media culture and customer expectations.
Wave 5 – The Socialisation of Brands je deo globalnog istraživanja koje se sprovodi sa ciljem da se definišu ogromne promene nastale u načinima komunikacije, kao rezultat rastućeg uticaja društvenih medija. Istraživanje se sprovodi jednom godišnje, od 2006. godine a ove godine po prvi put i u Srbiji.
What To Know About Starting in Social Media Tara Coomans
This presentation is newly updated for May 2013 with the latest statistics and insight needed to begin a career in social media marketing, includes examples and case studies as well as information about social media culture and customer expectations.
SocialSafe is your business social media library.
SocialSafe creates a full archive of all your Facebook, Facebook Pages, Twitter, LinkedIn, Google+, Blogs, Instagram, Pinterest social media posts, interactions and followers, to meet your legal compliance needs.
In addition SocialSafe provides excellent capabilities to support engagement monitoring across your social media use with Search, Insights and more.
As social media use increases throughout your organisation SocialSafe is THE cost-effective tool to support both regulatory compliance and engagement monitoring.
See www.socialsafe.net
Why shouldn’t you be the single biggest owner of your own data? The answer to that question is SocialSafe – Your library of you
SocialSafe enables users to create their own private and personal digital library of all their social media interactions, and then allows them to take advantage of that library by doing more with it.
We enable users to take control of their social media interactions, keeping a complete record of everything, aggregating it together and providing tools to access the library displaying the information, providing a full calendar/journal, allowing search across all data, isnights/statistics views, collections, export and additional functions to.
We support Facebook, Facebook Pages, Twitter, Google+, Instagram, LinkedIn, Viadeo, RSS (Blogs) and Pinterest. We will continue to add further networks such as Flickr, Spotify, etc in time.
Although contradictory in its title, this post does bring to light something I have recently been thinking about: ‘How private can you be on social networks?‘ I have a wide variety of social media accounts and use a huge list of tools in order to perform my daily activities effectively and efficiently.
Big data in transport an international transport forum overview oct 2013OpenSkyData
Comprehensive Guide on the use of Big Data in Transportation Services from the International Transport Forum. OpenSky loves making big data work for organisations large and small.
http://www.openskydata.com/our-sectors/transport.html
Stirista's data product, SocialORE contains verified information on millions of professional contacts. Our data includes valuable information such as professional experience, patents, and software use. Learn more about how SocialORE makes microtargeting easier than ever.
#SocialSelling Market and Sell to the Modern BuyerCraig Rosenberg
Want to know how to make social selling work? So does the team at Funnelholic.
That is why we asked Jill Rowley, the world's most famous social sales person, to deliver her framework for social selling success. Not someone who learned it from a book. Someone who actually finished as one of the top reps quarter after quarter. Someone who took her recipe for success and helped train 1000's or reps at the one of the biggest tech companies in the world - Oracle. Someone who is now training sales leaders, executives, and individual reps from the world's greatest companies. That's Jill.
Technology should be a beneficial force in our lives, taking the world in exciting new directions and making us better humans. To ensure this, we need to facilitate a conversation between data technology and the human experience. Keeping social responsibility and ethical behavior in mind when designing AI systems enables us to put the right systems in place to contribute to the society we want, fostering higher levels of cognitive and emotional skills.
Jivan Virdee and Hollie Lubbock explore how to address fairness, accountability, and the long-term effects on our society when designing with data, focusing on four key areas for consideration in this space:
— Responsibility and accountability for machine learning systems
— Fair and transparent data science
— Trust and human-machine collaboration
—Automation and changes in the way we work
Along the way, they cover key issues in creating ethical AI systems and detail how we might go about tackling them and outline further questions that will need to be addressed going forward.
Big thanks to @fjord and @accenturedock for their help and support
Talk by:
https://www.linkedin.com/in/hollie-lubbock-703b77b/
https://www.linkedin.com/in/jivanvirdee/
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
More Related Content
Similar to Account-Based Literacy A New Focus in Library Computer Instruction
SocialSafe is your business social media library.
SocialSafe creates a full archive of all your Facebook, Facebook Pages, Twitter, LinkedIn, Google+, Blogs, Instagram, Pinterest social media posts, interactions and followers, to meet your legal compliance needs.
In addition SocialSafe provides excellent capabilities to support engagement monitoring across your social media use with Search, Insights and more.
As social media use increases throughout your organisation SocialSafe is THE cost-effective tool to support both regulatory compliance and engagement monitoring.
See www.socialsafe.net
Why shouldn’t you be the single biggest owner of your own data? The answer to that question is SocialSafe – Your library of you
SocialSafe enables users to create their own private and personal digital library of all their social media interactions, and then allows them to take advantage of that library by doing more with it.
We enable users to take control of their social media interactions, keeping a complete record of everything, aggregating it together and providing tools to access the library displaying the information, providing a full calendar/journal, allowing search across all data, isnights/statistics views, collections, export and additional functions to.
We support Facebook, Facebook Pages, Twitter, Google+, Instagram, LinkedIn, Viadeo, RSS (Blogs) and Pinterest. We will continue to add further networks such as Flickr, Spotify, etc in time.
Although contradictory in its title, this post does bring to light something I have recently been thinking about: ‘How private can you be on social networks?‘ I have a wide variety of social media accounts and use a huge list of tools in order to perform my daily activities effectively and efficiently.
Big data in transport an international transport forum overview oct 2013OpenSkyData
Comprehensive Guide on the use of Big Data in Transportation Services from the International Transport Forum. OpenSky loves making big data work for organisations large and small.
http://www.openskydata.com/our-sectors/transport.html
Stirista's data product, SocialORE contains verified information on millions of professional contacts. Our data includes valuable information such as professional experience, patents, and software use. Learn more about how SocialORE makes microtargeting easier than ever.
#SocialSelling Market and Sell to the Modern BuyerCraig Rosenberg
Want to know how to make social selling work? So does the team at Funnelholic.
That is why we asked Jill Rowley, the world's most famous social sales person, to deliver her framework for social selling success. Not someone who learned it from a book. Someone who actually finished as one of the top reps quarter after quarter. Someone who took her recipe for success and helped train 1000's or reps at the one of the biggest tech companies in the world - Oracle. Someone who is now training sales leaders, executives, and individual reps from the world's greatest companies. That's Jill.
Technology should be a beneficial force in our lives, taking the world in exciting new directions and making us better humans. To ensure this, we need to facilitate a conversation between data technology and the human experience. Keeping social responsibility and ethical behavior in mind when designing AI systems enables us to put the right systems in place to contribute to the society we want, fostering higher levels of cognitive and emotional skills.
Jivan Virdee and Hollie Lubbock explore how to address fairness, accountability, and the long-term effects on our society when designing with data, focusing on four key areas for consideration in this space:
— Responsibility and accountability for machine learning systems
— Fair and transparent data science
— Trust and human-machine collaboration
—Automation and changes in the way we work
Along the way, they cover key issues in creating ethical AI systems and detail how we might go about tackling them and outline further questions that will need to be addressed going forward.
Big thanks to @fjord and @accenturedock for their help and support
Talk by:
https://www.linkedin.com/in/hollie-lubbock-703b77b/
https://www.linkedin.com/in/jivanvirdee/
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2. @decirella - Account-based Literacy - CLA April 30, 2013
David Cirella
New York Institute of Technology, Manhattan Library
@decirella
cirella.org
3. Account-Based Literacy Goals
Provide patrons with knowledge to:
Keep their privacy safe
Keep their online accounts safe
Keep their data safe
@decirella - Account-based Literacy - CLA April 30, 2013
5. Characteristics
Online services that require some
contribution on the part of the user
Creating an account
Entering personal information
Contributing content
@decirella - Account-based Literacy - CLA April 30, 2013
6. Characteristics
Creating an account
Username, email, password
Entering personal information
Name, address, email, phone number,
hobbies, likes
Contributing content
Personal photos, text, videos, comments,
location
@decirella - Account-based Literacy - CLA April 30, 2013
9. What Do These Have in Common?
Apple, Facebook, Yahoo mail, Tumblr,
Twitter, Microsoft, Evernote, Nationwide
insurance, Zappos, State of South Carolina,
Dropbox, Sony, Sega, Citigroup, last.fm,
Hotmail, AOL, Gawker Media, Monster.com,
Comcast, MSN, SBC Global, Verizon, TJ Max,
BellSouth, Living Social, Overdrive, Amazon,
Google, Pinterest, Peoples, Bank of America,
Ebay, Paypal, Flickr, and Live.com
@decirella - Account-based Literacy - CLA April 30, 2013
All require the creation
of a personal account &
the contribution of
personal information
10. What Do These Have in Common?
Apple, Facebook, Yahoo mail, Tumblr, Twitter,
Microsoft, Evernote, Nationwide insurance,
Zappos, State of South Carolina, Dropbox, Sony,
Sega, Citigroup, last.fm, Hotmail, AOL, Gawker
Media, Monster.com, Comcast, MSN, SBC
Global, Verizon, TJ Max, BellSouth, Living Social,
Overdrive, Amazon, Google, Pinterest, Peoples,
Bank of America, Ebay, Paypal, Flickr, and
Live.com
@decirella - Account-based Literacy - CLA April 30, 2013
These are the services
our patrons want to
learn and use
11. These serivces have already been
breached
@decirella - Account-based Literacy - CLA April 30, 2013
12. 2011 breach of Sony's PlayStation network
resulted in 100 million accounts being
exposed
@decirella - Account-based Literacy - CLA April 30, 2013
13. Password hashes belonging to 6 million
LinkedIn users were leaked, more than 90
percent of passwords were cracked in just six
days.
@decirella - Account-based Literacy - CLA April 30, 2013
14. LivingSocial.com, a site that offers daily
coupons on restaurants, spas, and other
services, has suffered a security breach that
has exposed names, e-mail addresses and
password data for up to 50 million of its users
@decirella - Account-based Literacy - CLA April 30, 2013
15. Why?
We are increasingly living online
We are sharing increasingly personal parts of
our lives online
We are being pulled into these services from
all directions
We will forever be tied to our actions,
usernames, and content online
@decirella - Account-based Literacy - CLA April 30, 2013
16. Why?
@decirella - Account-based Literacy - CLA April 30, 2013
Two-thirds of online American adults (67%)
are Facebook users
http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx
More than 71% of social networking users
ages 18-29 have changed the privacy settings
on their profile to limit what they share with
others online.
http://pewinternet.org/Reports/2010/Reputation-Management.aspx
18. Why?
@decirella - Account-based Literacy - CLA April 30, 2013
Reputation management has now become a
defining feature of online life for many
internet users, especially the young.
http://pewinternet.org/Reports/2010/Reputation-Management.aspx
19. Why?
Data is fragile
Data is deeply personal
Data stored by a third party is not as
important to them as it is to you
It may not be profitable for facebook to keep your
photos safe forever
@decirella - Account-based Literacy - CLA April 30, 2013
20. Why Us?
We are educators
We can teach cutting edge technology
Libraries are a place of last resort
We owe it to our patrons to arm them with
the tools needed to protect themselves
@decirella - Account-based Literacy - CLA April 30, 2013
21. Why Now?
All mainstream services operate on an
account-based model
Account-based services motivate many to
start using computers
Motivate many to seek out instruction
@decirella - Account-based Literacy - CLA April 30, 2013
22. Why Now?
Mobile
Non-traditional computer users adopting
mobile, tablet, ereader- platforms
Area of heaviest intergration is mobile
@decirella - Account-based Literacy - CLA April 30, 2013
23. Why Now?
Cyberbullying
78% of teens now have a cell phone, and almost
half (47%) of them own smartphones. That
translates into 37% of all teens who have
smartphones, up from just 23% in 2011.
95% of teens use the internet.
http://pewinternet.org/Reports/2013/Teens-and-Tech.asp
@decirella - Account-based Literacy - CLA April 30, 2013
24. Why Now?
An average PC can try on average 8.2 billion
password combinations each second
Leaks over of over 100 million real-world
passwords allows programmers to write faster
cracking algorithms
(http://arstechnica.com/security/2012/08/passwords-under-assault/)
@decirella - Account-based Literacy - CLA April 30, 2013
26. Account-based Literacy Training
Three Goals
1. Protecting accounts (reputation)
2. Protecting privacy
3. Preserving data
@decirella - Account-based Literacy - CLA April 30, 2013
27. Protecting Accounts
Avoid password reuse
Unique passwords must be used with each
account
Avoid cascading account breaches in the event of
a compromise
@decirella - Account-based Literacy - CLA April 30, 2013
28. The average Web user maintains 25 separate
accounts but uses just 6.5 passwords to
protect them.
@decirella - Account-based Literacy - CLA April 30, 2013
https://research.microsoft.com/pubs/74164/www2007.pdf)
29. Protecting Accounts
Use strong passwords.
Avoid simple words found in the dictionary
Use uppercase, lowercase, numbers, symbols
Passwords that are longer in length are also less
vulnerable to attack.
Ideally 20 characters or more with po0RspEllEng
grAmm.eeRthe
@decirella - Account-based Literacy - CLA April 30, 2013
30. Protecting Accounts
Pass phrase not password
puppy@Grandmas4vacation
23 characters long
Numbers, symbols, mixed case
Easy to remember, hard to guess
@decirella - Account-based Literacy - CLA April 30, 2013
32. Protecting Accounts
2 Factor Authentication
Use your password and temporary passcode
delivered to your mobile phone
@decirella - Account-based Literacy - CLA April 30, 2013
33. Protecting Accounts
Password Keepers- lockers
Software/services that store all your passwords
under one “lock” and key
Enables the easy use of very strong, complex,
unique password without burden
Browser and mobile integrationlastpass
@decirella - Account-based Literacy - CLA April 30, 2013
35. Protecting Privacy
Hierarchy of privilege regarding personal
information
Consider what the service is
what information is needed
how it’s likely to be used
@decirella - Account-based Literacy - CLA April 30, 2013
37. Protecting Privacy
Data mining / Account linking
Third-party data miners link online accounts
together into a coherent, single profile
@decirella - Account-based Literacy - CLA April 30, 2013
38. Preserving Data
Danger of data loss
Keep personal backup copies of any data held in
online services
Make backup copies of others data that you want
to keep (photos you appear in but are not part of
your account)
@decirella - Account-based Literacy - CLA April 30, 2013
39. Preserving Data
Mobile
Devices that exclusively rely on account-based
services but have no simple backup option.
Data created in mobile apps is often held online
and accessed by user accounts. Patrons must be
aware of and use data export tools to keep local
backup copies of all valuable data.
@decirella - Account-based Literacy - CLA April 30, 2013
40. Implementation
Get patrons thinking about these issues
Develop good habits
Not zero sum- every little bit helps
@decirella - Account-based Literacy - CLA April 30, 2013
41. Implementation
Appropriate for inclusion in all types of
computer instruction
Relate to specific services and applications
All types of users
@decirella - Account-based Literacy - CLA April 30, 2013
42. Implementation
Public Library
Integrate related topics: internet basics, social
networking, and job searching
Connect with youth and parents as relating to
cyberbullying
Academic Library
Integrate with dropbox, google doc instruction,
blackboard, turn it in
@decirella - Account-based Literacy - CLA April 30, 2013
44. Thank You
@decirella - Account-based Literacy - CLA April 30, 2013
@decirella
cirella.org
Account-Based Literacy
A New Focus in Library Computer Instruction
CLA April 30, 2013